{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:20Z","timestamp":1760597720842,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462974"},{"type":"electronic","value":"9783319462981"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46298-1_32","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T22:40:37Z","timestamp":1474324837000},"page":"499-506","source":"Crossref","is-referenced-by-count":10,"title":["Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining"],"prefix":"10.1007","author":[{"given":"Anisur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Yue","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Radke","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"32_CR1","first-page":"27","volume":"25","author":"P Pederson","year":"2006","unstructured":"Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical infrastructure interdependency modeling: a survey of US and international research. Idaho Natl. Lab. 25, 27 (2006)","journal-title":"Idaho Natl. Lab."},{"issue":"1","key":"32_CR2","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TII.2012.2198666","volume":"9","author":"M Cheminod","year":"2013","unstructured":"Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9(1), 277\u2013293 (2013)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"32_CR3","unstructured":"Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for SCADA networks. In: Proceedings of the SCADA Security Scientific Symposium, vol. 46, pp. 1\u201312 (2007)"},{"issue":"4","key":"32_CR4","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10207-012-0163-8","volume":"11","author":"D Had\u017eiosmanovi\u010d","year":"2012","unstructured":"Had\u017eiosmanovi\u010d, D., Bolzoni, D., Hartel, P.H.: A log mining approach for process monitoring in SCADA. Int. J. Inf. Secur. 11(4), 231\u2013251 (2012)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"32_CR5","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/S1389-1286(00)00138-9","volume":"34","author":"S Manganaris","year":"2000","unstructured":"Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A data mining analysis of RTID alarms. Comput. Netw. 34(4), 571\u2013577 (2000)","journal-title":"Comput. Netw."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Clifton, C., Gengo, G.: Developing custom intrusion detection filters using data mining. In: IEEE Proceedings 21st Century Military Communication, vol. 1, pp. 440\u2013443 (2000)","DOI":"10.1109\/MILCOM.2000.904991"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Barbara, D., Wu, N., Jajodia, S.: Detecting novel network intrusions using Bayes estimators. In: 1st SIAM Conference on Data Mining, pp. 1\u201317 (2001)","DOI":"10.1137\/1.9781611972719.28"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Szathmary, L., Napoli, A., Valtchev, P.: Towards rare itemset mining. In: 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007), vol. 1, pp. 305\u2013312 (2007)","DOI":"10.1109\/ICTAI.2007.30"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proceedings of the 11th International Conference on Data Engineering, pp. 3\u201314. IEEE (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/978-3-319-10160-6_42","volume-title":"Data Warehousing and Knowledge Discovery","author":"P Fournier-Viger","year":"2014","unstructured":"Fournier-Viger, P., Gomariz, A., \u0160ebek, M., Hlosta, M.: VGEN: fast vertical mining of sequential generator patterns. In: Bellatreche, L., Mohania, M.K. (eds.) DaWaK 2014. LNCS, vol. 8646, pp. 476\u2013488. Springer, Heidelberg (2014)"},{"key":"32_CR11","first-page":"3389","volume":"15","author":"P Fournier-Viger","year":"2014","unstructured":"Fournier-Viger, P., Gomariz, A., Gueniche, T., Soltani, A., Wu, C., Tseng, V.S.: SPMF: a Java open-source pattern mining library. J. Mach. Learn. Res. (JMLR) 15, 3389\u20133393 (2014)","journal-title":"J. Mach. Learn. Res. (JMLR)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46298-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:11:59Z","timestamp":1498331519000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46298-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462974","9783319462981"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46298-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}